Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone.
☆374Apr 20, 2021Updated 4 years ago
Alternatives and similar repositories for Solitude
Users that are interested in Solitude are comparing it to the libraries listed below
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆256Apr 6, 2024Updated last year
- Phishing Framework for Pentesters☆201May 16, 2023Updated 2 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆208Apr 3, 2025Updated 10 months ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- Unlocking Serverless Computing to Assess Security Controls☆261Mar 15, 2024Updated last year
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Apr 6, 2024Updated last year
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,215Feb 3, 2025Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,541Aug 2, 2024Updated last year
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 7 months ago
- An nmap script to produce target lists for use with various tools.☆33May 13, 2021Updated 4 years ago
- ☆19Mar 23, 2021Updated 4 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated 11 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Dec 22, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated last week
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,916Updated this week
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,778Feb 18, 2026Updated last week
- Miscellaneous Tools☆269Oct 29, 2020Updated 5 years ago
- A C2 post-exploitation framework☆482Jan 24, 2024Updated 2 years ago
- The OSINT Omnibus (beta release)☆347May 20, 2024Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Feb 21, 2025Updated last year
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago